Analysis

  • max time kernel
    79s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 06:47

General

  • Target

    b6d4d85540bf70ac43b05ed94efc8f021d07526a56543f06dae986337e3d84e2.dll

  • Size

    864KB

  • MD5

    aee9d12ec17e9fc250cfb56f9a530e36

  • SHA1

    509405a33897700ee9d294c92397b352288ab342

  • SHA256

    b6d4d85540bf70ac43b05ed94efc8f021d07526a56543f06dae986337e3d84e2

  • SHA512

    4b75e0bf47e41b984bba62259e770e54963c141c71bfcc6a0bbc36068a37fadcef9c9d5177192dd544e060440fa51eb532780e4850d57aedce98764a64c96d46

  • SSDEEP

    24576:SMkuNMkBhiyJRwQnN2K3yWds0JkKyVx+HNrUQRqM8:rkuNMkTialcadsLz+tgQM

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b6d4d85540bf70ac43b05ed94efc8f021d07526a56543f06dae986337e3d84e2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b6d4d85540bf70ac43b05ed94efc8f021d07526a56543f06dae986337e3d84e2.dll,#1
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c start http://www.pekalongan-community.com/
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.pekalongan-community.com/
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:888
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 432
        3⤵
        • Program crash
        PID:756

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LIX27CIM.txt
    Filesize

    608B

    MD5

    2bb1922f86b8fca67711ef9dab62893b

    SHA1

    9222c41a59d0bb6315d2916d691a7087eb55fa4c

    SHA256

    918552742408e1830c5e1a1d37e32d6027cdc4dc148411b9f7f7e167e88cb511

    SHA512

    1527de14b7312f41d3c5fb18bde6382591f785553f74b3d373ba397a50f3594ce4032ab60d06e279134e19e992d17bc8f55b723b1e46f79150a5e8640a130b50

  • memory/756-62-0x0000000000000000-mapping.dmp
  • memory/1680-54-0x0000000000000000-mapping.dmp
  • memory/1680-55-0x0000000075921000-0x0000000075923000-memory.dmp
    Filesize

    8KB

  • memory/1680-56-0x0000000074F20000-0x000000007536F000-memory.dmp
    Filesize

    4.3MB

  • memory/1680-57-0x0000000074AD0000-0x0000000074F1F000-memory.dmp
    Filesize

    4.3MB

  • memory/1680-58-0x0000000074AD0000-0x0000000074F1F000-memory.dmp
    Filesize

    4.3MB

  • memory/1680-61-0x0000000074AD0000-0x0000000074F1F000-memory.dmp
    Filesize

    4.3MB

  • memory/1708-59-0x0000000000000000-mapping.dmp